On Sat, Apr 18, 2009 at 7:31 PM, Charles Forsyth <fors...@terzarima.net> wrote:
> this discussion of checkpoint/restart reminds me of
> a hint i was given years ago: if you wanted to break into a system,
> attack through the checkpoint/restart system. i won a jug of
> beer for my subsequent successful attack which involved patching
> the disc offset for an open file in a copy of the Slave Service Area saved
> by the checkpoint; with the offset patched to zero, the newly restored process
> could read the file and dump the users and passwords conveniently stored in 
> the clear at
> the start of the system area of the system disc.  the hard bit was
> writing the code to dump the data in a tidy way.
>
>

Unfortunately, in the rush to build the Next Cool Thing people often
leave security issues to the very end, at which point shoehorning
fixes in gets ugly.

Reply via email to